Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems

Mohammad Ali

Volume 14, Issue 3 , October 2022, , Pages 43-49

https://doi.org/10.22042/isecure.2022.0.0.0

Abstract
  Remote data auditing (RDA) protocols enable a cloud server to persuade an auditor that it is storing a data file honestly. Unlike digital signature(DS) schemes, in RDA protocols, the auditor can carry out the auditing procedure without having the entire data file. Therefore, RDA protocols seem to be ...  Read More

Forensic-Enabled Security as a Service (FESaaS) - A Readiness Framework for Cloud Forensics

Wedad Alawad; Awatef Balobaid

Volume 13, Issue 3 , November 2021, , Pages 49-57

https://doi.org/10.22042/isecure.2021.0.0.0

Abstract
  Digital forensics is a process of uncovering and exploring evidence from digital content. A growth in digital data in recent years has made it challenging for forensic investigators to uncover useful information. Moreover, the applied use of cloud computing has increased significantly in past few years ...  Read More

Knowledge Discovery in Cloud-Computing Environment and the Challenges

Najah K. Almazmomi

Volume 12, Issue 3 , November 2020, , Pages 95-99

https://doi.org/10.22042/isecure.2021.273750.640

Abstract
  Today, in the area of telecommunication, social media, the internet of things (IoT), and the virtual world, enormous amounts of data are being generated which are extracted to discover knowledge. Knowledge discovery from data in the cloud-computing environment entails the extraction of the new and necessary ...  Read More

Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS)

Tahir Alyas; Gulzar Ahmad; Yousaf Saeed; Muhammad Asif; Umer Farooq; Asma Kanwal

Volume 11, Issue 3 , August 2019, , Pages 153-160

https://doi.org/10.22042/isecure.2019.11.0.20

Abstract
  Internet of Things (IoT) and cloud computing technologies have connected the infrastructure of the city to make the context-aware and more intelligent city for utility its major resources. These technologies have much potential to solve thechallenges of urban areas around the globe to facilitate ...  Read More

IoT Protocols Based Fog/Cloud over High Traffic

Istabraq M. Al-Joboury; Emad H. Al-Hemiary

Volume 11, Issue 3 , August 2019, , Pages 173-180

https://doi.org/10.22042/isecure.2019.11.3.23

Abstract
  The Internet of Things (IoT) becomes the future of a global data field in which the embedded devices communicate with each other, exchange data and making decisions through the Internet. IoT could improve the quality of life in smart cities, but a massive amount of data from different smart devices could ...  Read More

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

Javad Ghareh Chamani; Mohammad Sadeq Dousti; Rasool Jalili; Dimitrios Papadopoulos

Volume 11, Issue 1 , January 2019, , Pages 15-34

https://doi.org/10.22042/isecure.2019.148637.430

Abstract
  While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called ...  Read More

A risk model for cloud processes

E. Damiani; S. Cimato; G. Gianini

Volume 6, Issue 2 , July 2014, , Pages 99-123

https://doi.org/10.22042/isecure.2015.6.2.2

Abstract
  Traditionally, risk assessment consists of evaluating the probability of "feared events", corresponding to known threats and attacks, as well as these events' severity, corresponding to their impact on one or more stakeholders. Assessing risks of cloud-based processes is particularly difficult due to ...  Read More